Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Can Deepfakes be created on a whim?, , , , , , , and . WWW (Companion Volume), page 1324-1334. ACM, (2023)Benchmarking Large Language Models for Automated Verilog RTL Code Generation., , , , , , , and . DATE, page 1-6. IEEE, (2023)Homo in Machina: Improving Fuzz Testing Coverage via Compartment Analysis., , , , and . ICST, page 117-128. IEEE, (2023)Security Implications of Large Language Model Code Assistants: A User Study., , , , , and . CoRR, (2022)Model Cascading for Code: Reducing Inference Costs with Model Cascading for LLM Based Code Generation., , , , and . CoRR, (2024)EnIGMA: Enhanced Interactive Generative Model Agent for CTF Challenges., , , , , , , , , and 6 other author(s). CoRR, (2024)BadNets: Evaluating Backdooring Attacks on Deep Neural Networks., , , and . IEEE Access, (2019)Towards Deceptive Defense in Software Security with Chaff Bugs., , and . RAID, page 43-55. ACM, (2022)IRQDebloat: Reducing Driver Attack Surface in Embedded Devices., and . SP, page 1608-1622. IEEE, (2022)Asleep at the Keyboard? Assessing the Security of GitHub Copilot's Code Contributions., , , , and . SP, page 754-768. IEEE, (2022)